[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <OFC841ED64.A7930463-ON88256FC6.005F08A5-88256FC6.005F3A23@notesmail.csulb.edu>
From: rsumida at csulb.edu (Ryan Sumida)
Subject: Wi-fi. Approaching customers
But wouldn't you need to know where the sensors are located? If they are
passive and never send out traffic how would you find them aside from
social engineering?
Ryan
full-disclosure-bounces@...ts.grok.org.uk wrote on 03/16/2005 08:25:53 AM:
>
> Just making a wild guess here, but - if I were going to implement
> something like this, I'd think to use a rough sort of triangulation.
> Put access points outside the building, but don't use them to grant
> network access, only to compare the signal strength of transmissions you
> pick up on the inside access points.
>
> That might then open you up to someone with a carefully aimed
> directional antenna shooting their signal straight at one of your
> "inside" sensors, and letting the "outside" ones only see a very weak
> signal. Still, just sitting in a park with a laptop should be
> detectable.
>
> I guess you could only meaningfully compare signal strengths as seen at
> different points, as at light speed the delays wouldn't be measurable
> with any sort of accuracy. (If you could measure the delays you'd be in
> great shape - that was used in WWI to pick out the location of gun
> batteries, just using two mics and very accurate timers.)
>
> Purest speculation though - I've no idea how they do this.
>
> Mark
>
>
> -----------
> on March 15, 2005 22:04 Ron DuFresne wrote:
>
> On Wed, 16 Mar 2005, Gregh wrote:
>
> [HEADERS SNIPPED]
>
> >
> >
> > >
> > >>From what little I read on their site, it seems to be a radius auth
> > >>mech
> > > based upon MAC addresses.
> > >
> >
> > Isn't that basically what a lot of wi-fi broadband router/modems do
> anyway?
> >
> > Eg, set up a netgear DG834 (think it was) and it was having problems
> with auto assigned IPs for lan members so shortcut the problem by
> telling it to manually assign IP number to MAC so that each time a MAC
> came in range it got the same IP number always. I set the IP numbers
> manually at each client computer and thus they would only connect using
> that number. Connection problems died off instantly, then. The upshot is
> that if the MAC is unknown, it cant get access now even if the WEP is
> successfully decrypted. Wouldn't that radius auth be basically that
> idea?
> >
>
> That's what I read, as well as a lot of talk about "location-enabled
> network or LENs", which the more reading I do give the impression they
> have some kind of GPS functionality invovled, this is the only way I can
> make any real sense of their claims to be able to segment the wLAN<s>
> into locations and determine a sense of perimiter limits and location
> sense.
> Of course, I'm trying to give the benefit of the doubt and read that
> they actually sell what they are claiming in marketing lit.
>
> Thanks,
>
>
> Ron DuFresne
> --
> "Sometimes you get the blues because your baby leaves you. Sometimes you
> get'em 'cause she comes back." --B.B. King
> ***testing, only testing, and damn good at it too!***
>
> OK, so you're a Ph.D. Just don't touch anything.
>
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://www.secunia.com/
>
> This email and any files transmitted with it are confidential and
> intended solely for the use of the individual or entity to whom they are
> addressed. If you have received this email in error please notify the
> system manager. This message contains confidential information and is
> intended only for the individual named. If you are not the named
> addressee you should not disseminate, distribute or copy this e-mail.
>
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://www.secunia.com/
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050316/bb55bd5c/attachment.html
Powered by blists - more mailing lists